
Sign up to save your podcasts
Or


Summary
In this episode of Below the Surface, Paul Asadoorian and Chase Snyder delve into various cybersecurity topics, including the use of Raspberry Pi in cyber attacks, the implications of the F5 breach, and the emergence of Polar Edge malware targeting QNAP devices. They also discuss the innovative Two-Face Rust binary technique, the critical nature of authentication bypass vulnerabilities, and the evolving landscape of air-gapped systems. The conversation highlights the increasing risk posed by old vulnerabilities and the need for improved security measures in the face of advancing cyber threats.
Articles:
https://reporter.deepspecter.com/f5-is-misleading-the-market-the-breach-is-nowhere-near-contained-a766d932c582
https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/
https://www.group-ib.com/blog/unc2891-bank-heist/
https://www.synacktiv.com/en/publications/creating-a-two-face-rust-binary-on-linux
https://www.dell.com/support/kbdoc/en-us/000382899/dsa-2025-393-security-update-for-storage-center-dell-storage-manager-vulnerabilities
https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html
By Eclypsium5
22 ratings
Summary
In this episode of Below the Surface, Paul Asadoorian and Chase Snyder delve into various cybersecurity topics, including the use of Raspberry Pi in cyber attacks, the implications of the F5 breach, and the emergence of Polar Edge malware targeting QNAP devices. They also discuss the innovative Two-Face Rust binary technique, the critical nature of authentication bypass vulnerabilities, and the evolving landscape of air-gapped systems. The conversation highlights the increasing risk posed by old vulnerabilities and the need for improved security measures in the face of advancing cyber threats.
Articles:
https://reporter.deepspecter.com/f5-is-misleading-the-market-the-breach-is-nowhere-near-contained-a766d932c582
https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/
https://www.group-ib.com/blog/unc2891-bank-heist/
https://www.synacktiv.com/en/publications/creating-a-two-face-rust-binary-on-linux
https://www.dell.com/support/kbdoc/en-us/000382899/dsa-2025-393-security-update-for-storage-center-dell-storage-manager-vulnerabilities
https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html

228,524 Listeners

2,004 Listeners

209 Listeners

265 Listeners

374 Listeners

637 Listeners

89 Listeners

322 Listeners

8,020 Listeners

61 Listeners

586 Listeners

1 Listeners